General

  • Target

    8704e65078bad9d01bc9d825f59265ca49809df85589632ab51b050d465b003c

  • Size

    424KB

  • Sample

    241110-2d4f3swgpp

  • MD5

    97d1320cae4461afa4020aa210f5f621

  • SHA1

    0de311e93e7998c70e22bacb4d58ac819a3e02fd

  • SHA256

    8704e65078bad9d01bc9d825f59265ca49809df85589632ab51b050d465b003c

  • SHA512

    8cb0fe4816a0c1c2363c31e5ceda6050f01662562a74d23ad3f2aab022923983cda057837101be2e5a4f4054409acad83a50c4cf9ffce1a64cffed8b13ecbe9f

  • SSDEEP

    6144:Kuy+bnr+0p0yN90QEx1XPcgvUZMSvebvAFHIlQXa9+nivBgAKGFbSqHdMpiTIfLN:mMrky90f1XiMpvAJcQnixlmzkO

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      8704e65078bad9d01bc9d825f59265ca49809df85589632ab51b050d465b003c

    • Size

      424KB

    • MD5

      97d1320cae4461afa4020aa210f5f621

    • SHA1

      0de311e93e7998c70e22bacb4d58ac819a3e02fd

    • SHA256

      8704e65078bad9d01bc9d825f59265ca49809df85589632ab51b050d465b003c

    • SHA512

      8cb0fe4816a0c1c2363c31e5ceda6050f01662562a74d23ad3f2aab022923983cda057837101be2e5a4f4054409acad83a50c4cf9ffce1a64cffed8b13ecbe9f

    • SSDEEP

      6144:Kuy+bnr+0p0yN90QEx1XPcgvUZMSvebvAFHIlQXa9+nivBgAKGFbSqHdMpiTIfLN:mMrky90f1XiMpvAJcQnixlmzkO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks